Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.48.166.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56980
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.48.166.22.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 21:57:39 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 22.166.48.81.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 22.166.48.81.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.161.29.150 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-25 14:19:22,387 INFO [shellcode_manager] (14.161.29.150) no match, writing hexdump (139da1c6bfad2642794cc0609ba0d8de :2197847) - MS17010 (EternalBlue)
2019-08-26 04:30:07
188.254.0.160 attackbots
Aug 25 09:37:27 lcdev sshd\[23592\]: Invalid user ftp from 188.254.0.160
Aug 25 09:37:27 lcdev sshd\[23592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.160
Aug 25 09:37:29 lcdev sshd\[23592\]: Failed password for invalid user ftp from 188.254.0.160 port 57876 ssh2
Aug 25 09:41:37 lcdev sshd\[24078\]: Invalid user user from 188.254.0.160
Aug 25 09:41:37 lcdev sshd\[24078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.160
2019-08-26 04:08:07
62.4.23.104 attackbotsspam
Aug 25 14:39:37 aat-srv002 sshd[25804]: Failed password for ftp from 62.4.23.104 port 49958 ssh2
Aug 25 14:43:24 aat-srv002 sshd[25927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.4.23.104
Aug 25 14:43:26 aat-srv002 sshd[25927]: Failed password for invalid user silver from 62.4.23.104 port 41544 ssh2
...
2019-08-26 03:51:37
186.147.237.51 attack
Aug 25 19:04:57 sshgateway sshd\[7301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.147.237.51  user=root
Aug 25 19:04:58 sshgateway sshd\[7301\]: Failed password for root from 186.147.237.51 port 53180 ssh2
Aug 25 19:09:41 sshgateway sshd\[7326\]: Invalid user dave from 186.147.237.51
2019-08-26 03:49:35
45.55.12.248 attackspambots
Aug 25 09:46:51 lcprod sshd\[19064\]: Invalid user gts from 45.55.12.248
Aug 25 09:46:51 lcprod sshd\[19064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.12.248
Aug 25 09:46:53 lcprod sshd\[19064\]: Failed password for invalid user gts from 45.55.12.248 port 42664 ssh2
Aug 25 09:51:23 lcprod sshd\[19451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.12.248  user=sshd
Aug 25 09:51:25 lcprod sshd\[19451\]: Failed password for sshd from 45.55.12.248 port 57972 ssh2
2019-08-26 04:06:24
111.9.116.135 attack
Aug 25 21:13:46 mail sshd\[639\]: Invalid user info from 111.9.116.135 port 50286
Aug 25 21:13:46 mail sshd\[639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.9.116.135
...
2019-08-26 04:22:52
43.231.61.147 attackspam
$f2bV_matches
2019-08-26 04:10:08
132.232.104.106 attack
Aug 25 09:41:41 lcprod sshd\[18566\]: Invalid user kawa from 132.232.104.106
Aug 25 09:41:41 lcprod sshd\[18566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.104.106
Aug 25 09:41:44 lcprod sshd\[18566\]: Failed password for invalid user kawa from 132.232.104.106 port 38732 ssh2
Aug 25 09:46:13 lcprod sshd\[18990\]: Invalid user masumi from 132.232.104.106
Aug 25 09:46:13 lcprod sshd\[18990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.104.106
2019-08-26 03:58:25
175.98.115.247 attackbotsspam
Aug 25 09:39:24 php2 sshd\[4223\]: Invalid user natasa from 175.98.115.247
Aug 25 09:39:24 php2 sshd\[4223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175-98-115-247.static.tfn.net.tw
Aug 25 09:39:26 php2 sshd\[4223\]: Failed password for invalid user natasa from 175.98.115.247 port 57038 ssh2
Aug 25 09:44:01 php2 sshd\[4620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175-98-115-247.static.tfn.net.tw  user=root
Aug 25 09:44:02 php2 sshd\[4620\]: Failed password for root from 175.98.115.247 port 46006 ssh2
2019-08-26 03:52:12
165.22.179.42 attackbots
Aug 25 18:58:53 vtv3 sshd\[5571\]: Invalid user test01 from 165.22.179.42 port 33902
Aug 25 18:58:53 vtv3 sshd\[5571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.179.42
Aug 25 18:58:55 vtv3 sshd\[5571\]: Failed password for invalid user test01 from 165.22.179.42 port 33902 ssh2
Aug 25 19:02:39 vtv3 sshd\[7545\]: Invalid user tads from 165.22.179.42 port 51548
Aug 25 19:02:39 vtv3 sshd\[7545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.179.42
Aug 25 19:14:00 vtv3 sshd\[13015\]: Invalid user exit from 165.22.179.42 port 47352
Aug 25 19:14:00 vtv3 sshd\[13015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.179.42
Aug 25 19:14:01 vtv3 sshd\[13015\]: Failed password for invalid user exit from 165.22.179.42 port 47352 ssh2
Aug 25 19:17:56 vtv3 sshd\[15091\]: Invalid user udit from 165.22.179.42 port 36644
Aug 25 19:17:56 vtv3 sshd\[15091\]: pam_unix\(ss
2019-08-26 04:25:13
50.28.33.173 attackbotsspam
invalid username 'admin'
2019-08-26 04:37:09
106.12.208.211 attackbots
Aug 25 09:06:41 kapalua sshd\[25645\]: Invalid user web from 106.12.208.211
Aug 25 09:06:41 kapalua sshd\[25645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.208.211
Aug 25 09:06:43 kapalua sshd\[25645\]: Failed password for invalid user web from 106.12.208.211 port 45390 ssh2
Aug 25 09:11:16 kapalua sshd\[26152\]: Invalid user unit from 106.12.208.211
Aug 25 09:11:16 kapalua sshd\[26152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.208.211
2019-08-26 03:45:47
139.209.241.162 attackspam
Splunk® : Brute-Force login attempt on SSH:
Aug 25 14:52:19 testbed sshd[24041]: Failed password for invalid user admin from 139.209.241.162 port 37618 ssh2
2019-08-26 03:47:08
191.253.110.171 attackbots
Attempt to login to email server on SMTP service on 25-08-2019 19:51:29.
2019-08-26 04:19:36
114.247.177.155 attack
Aug 25 21:37:53 plex sshd[28795]: Invalid user tw from 114.247.177.155 port 39316
2019-08-26 03:46:21

Recently Reported IPs

134.214.158.6 131.103.6.122 9.231.47.174 32.78.116.22
140.187.57.14 48.100.138.185 69.216.69.22 228.139.85.172
191.43.208.184 138.94.51.46 93.126.191.221 199.56.95.9
47.77.135.104 219.120.154.77 166.92.100.30 32.201.219.207
196.155.175.133 231.48.111.156 131.218.150.15 86.11.2.184